Commit Graph

820 Commits (fd7258085920ed8b4e28e679e9306b1aee61cafd)

Author SHA1 Message Date
Luke Latham aac9bf5e4a
Update config value names in sample app (#10846) 2019-02-08 10:56:30 -06:00
Nick George c60d8b473f Update Program.cs to fix typo (#10843) 2019-02-07 16:57:37 -06:00
Rick Anderson 0654589615
Update cookie.md (#10813)
Fixes #10801
2019-02-06 09:09:42 -10:00
Luke Latham db6be9e19e
AKV config provider topic approach clarification (#10810) 2019-02-06 07:02:42 -06:00
Rick Anderson 57fc8d927e
Update Intro to Identity (#10792)
* Update Intro to Identity

* work

* work

* work

* work

* work

* work
2019-02-04 18:25:44 -10:00
Luke Latham eeb01eb04a Key Vault Config Provider topic and sample updates (#10669)
Updates

Updates

Updates

Updates

Updates
2019-02-04 13:17:58 -10:00
Luke Latham 4d8b6ca6a0 Clarify User Secrets usage in App Secrets topic (#10722)
* Clarify User Secrets usage in App Secrets topic

* Update aspnetcore/security/app-secrets.md

Co-Authored-By: guardrex <1622880+guardrex@users.noreply.github.com>
2019-01-31 08:54:46 -08:00
Andrew Steele 111a56b46f Update AngularJS code section setting cookie (#10693)
Fixes #9509

Change the documentation to make it more clear that a cookie must be set server side to take advantage of the AngularJS convention to address CSRF. This change adds code showing how to set the cookie via `IAntiforgery`.
2019-01-30 13:09:20 -10:00
Rick Anderson 88fcd83ff6
Surface auth samples (#10628)
* Surface auth samples

* TOC

* work

* work
2019-01-28 16:25:26 -10:00
Rick Anderson 70bbfe1f8c
Update identity-enable-qrcodes.md (#10592)
Fixes #8583
2019-01-25 12:44:00 -10:00
Rick Anderson 768c9d90da
Update gdpr.md (#10595)
* Update gdpr.md

* Update aspnetcore/security/gdpr.md

Co-Authored-By: Rick-Anderson <riande@microsoft.com>
2019-01-23 15:54:20 -10:00
Scott Addie 6fd43ae38e Fix indentation in web.config snippet 2019-01-22 13:38:21 -06:00
Luke Latham f99a209428
Update links to sample app (#10521) 2019-01-21 08:36:50 -06:00
Rick Anderson d3e4bfdd0a
Update key-management-extensibility.cs (#10510)
Fixes #8302
2019-01-20 11:07:03 -10:00
Pavel Krymets 2abd586b7e
Specify what is being used for application discrimination (#10488) 2019-01-18 11:52:07 -08:00
l0bd0n f59ce774b9 Fix typo in accconfirm.md (#10476) 2019-01-18 10:36:17 -06:00
Rick Anderson 49f7b4ece3
Remove Google+ API (#10445)
Fixes #10079
[Internal review URL](https://review.docs.microsoft.com/en-us/aspnet/core/security/authentication/social/google-logins?view=aspnetcore-1.0&branch=pr-en-us-10445)
2019-01-17 14:05:24 -10:00
Rick Anderson 32656f31b4
Social login update (#10440) 2019-01-16 13:10:41 -10:00
Dave 974bb1b3ef Update ws-federation.md (#10438) 2019-01-16 17:03:06 -06:00
Luke Latham b808dc0793
Note packages for WinAuth (#10405) 2019-01-15 13:56:00 -06:00
Rick Anderson 38781342eb
Update iauthorizationpolicyprovider.md (#10332)
* Update iauthorizationpolicyprovider.md

* Update iauthorizationpolicyprovider.md
2019-01-11 09:23:55 -10:00
Jon Stelly 8ab09af7a4 Wording improvement for policy-based authorization (#10290)
Not sure if this complies with formatting/wording standards for the docs, but figured I'd create a pull request for my issue: https://github.com/aspnet/Docs/issues/10288
2019-01-09 11:26:06 -06:00
Rick Anderson e961eee392
Update gdpr.md 2019-01-08 14:15:54 -10:00
Rick Anderson dd490ba50d
Update secure-data.md (#10254) 2019-01-07 09:42:11 -10:00
Kirk Larkin 5890aa03f3 Fixed "ASP.Core 2.1" typo. (#10253) 2019-01-07 13:36:34 -06:00
Kirk Larkin f85a847974 Updated link to 2.2 AddDefaultIdentity source. (#10225) 2019-01-05 08:20:51 -10:00
Luke Latham e5f13735c5
WinAuth topic enhancements (#10094) 2019-01-04 17:48:56 -06:00
Luke Latham 1fe1d47a04
Review/update use of "SSL" (#10139) 2019-01-04 17:16:27 -06:00
Kirk Larkin e3c03301fc Updated link to AddDefaultIdentity source. (#10184) 2019-01-03 12:18:46 -06:00
Luke Latham 62e9086ed0
Table migration for PersistKeysToDbContext (#10069) 2018-12-19 15:53:38 -06:00
Valeriy Novytskyy 227110694c Fixes #10015 Update code samples (#10068)
Review and update code samples for setting up social providers on asp.net core 2.

* Turns out they already had notes about default service settings being overridden when setting up social providers, so no change necessary - please sanity check. I ended up just updating the sample code to match the latest result from WebApp generator.

Remove bad repo link in social index.

<!--
# Instructions

When creating a new PR, please reference the issue number if there is one:

Fixes #Issue_Number

The "Fixes #nnn" syntax in the PR description allows GitHub to automatically close the issue when this PR is merged.

NOTE: This is a comment; please type your descriptions above or below it.
-->
2018-12-19 11:39:33 -10:00
Luke Latham 77861347f0
Fundamentals > Servers (#10002) 2018-12-19 12:52:37 -06:00
Dave Brock a3996b71c0 Make Microsoft.AspNetCore.Authentication.Facebook optional (#10040)
* Make Microsoft.AspNetCore.Authentication.Facebook optional

* minor edits
2018-12-18 11:01:03 -06:00
Tom Dykstra df0e93aeae
ms.custom format per Doug E. (#9949) 2018-12-11 08:01:58 -08:00
Luke Latham 11b975f395
Secure data topic updates (#9899) 2018-12-07 18:51:48 -06:00
Luke Latham 46729ad85e
Update link for engineering sample move (#9867) 2018-12-07 18:41:19 -06:00
Rick Anderson 5d633e4d85
Update Edit.cshtml.cs (#9850)
* Update Edit.cshtml.cs

* Update Edit.cshtml.cs
2018-12-06 17:22:52 -10:00
Cam Soper f3ae7f0176
SEO Hackathon December 2018 changes (#9876)
* Whoops - didn't mean to merge that to this branch!

* minor updates

* minor updates

* Fixed issue #8552

* added a note on URL

* made Auth URL consistent with the portal (rather than Visual Studio)

* added a cool dagger for Luke

* phrasing

* formatting

* formatting - re-adding code fenced URLs

* Update azure-ad-b2c-webapi.md

* SEO 2018 for /core/azure and /core/security directories

* SEO 2018 for /core/razor-pages directory

* added custom tag
2018-12-06 17:21:48 -06:00
Luke Latham d18fa2b084
2.2 Sample Updates (#9795) 2018-12-04 10:56:13 -06:00
lovelangy 9924cb4e22 Error NU1605: Detected package downgrade. (#9748)
Demo\IdentityDemo.csproj : error NU1605: Detected package downgrade: Microsoft.EntityFrameworkCore.Tools from 2.0.3 to 2.0.0. Reference the package directly from the project to select a different version.
Demo\IdentityDemo.csproj : error NU1605:  IdentityDemo -> Microsoft.AspNetCore.All 2.0.9 -> Microsoft.EntityFrameworkCore.Tools (>= 2.0.3)
Demo\IdentityDemo.csproj : error NU1605:  IdentityDemo -> Microsoft.EntityFrameworkCore.Tools (>= 2.0.0)

The build failed. Please fix the build errors and run again.



<!--
When creating a new PR, please do the following:

* Reference the issue number if there is one, e.g.:

Fixes #Issue_Number

The "Fixes #nnn" syntax in the PR description allows GitHub to automatically close the issue when this PR is merged.

NOTE: This is a comment; please type your descriptions above or below it.
-->
2018-12-03 14:41:45 -10:00
Luke Latham e2838d2d8f
Drop 'reverse proxy' language (#9746) 2018-12-03 16:52:20 -06:00
Rick Anderson 70a9189c02 Update cors.md (#9704)
* Update cors.md

* Update cors.md

* Use xref API link
2018-11-27 20:42:06 -06:00
Luke Latham 7fe89d77c0
CORS topic updates (#9685) 2018-11-27 16:04:42 -06:00
Tom Dykstra a214e23ac7
Remove duplicate list of links (#9639) 2018-11-19 08:23:56 -08:00
Scott Addie efa3c4e0c2
Link to Requirements creation section (#9600)
Fixes https://github.com/aspnet/Docs/issues/9584

Also replaced the tabs with moniker ranges while I was in there.
2018-11-15 13:44:05 -06:00
Luke Latham 8031f63a22 Surface Forward Headers in ext auth provider topics (#9554)
Fixes #9549 

* Not a full UE pass on the group of external provider topics ... don't quite have time for that right now. However, I do hit a number of small UE-type updates.
* Engineering: You only need to look at one thing here: See the *forwarded-headers-middleware.md* file. The content of the file is below. The INCLUDE is linked into the external auth provider topics to surface Forwarded Headers Middleware (proxy/LB topic).

> \#\# Forward request information with a proxy or load balancer
>
> If the app is deployed behind a proxy server or load balancer, some of the original request information might be forwarded to the app in request headers. This information usually includes the secure request scheme (\`https\`), host, and client IP address. Apps don't automatically read these request headers to discover and use the original request information.
>
> The scheme is used in link generation that affects the authentication flow with external providers. Losing the secure scheme (\`https\`) results in the app generating incorrect insecure redirect URLs.
>
> Use Forwarded Headers Middleware to make the original request information available to the app for request processing.
>
> For more information, see \<xref:host-and-deploy/proxy-load-balancer>.

If it's easier to provide feedback in a comment here over hunting down the file on the diff, that works for me.
2018-11-14 15:58:01 -06:00
Luke Latham 5cfc4cdda0
Clarify shared DP version for shared DP payloads (#9546) 2018-11-13 13:43:40 -06:00
Vincent Pestana cb089c7f1d Update Login.cshtml.cs (#9560) 2018-11-12 15:21:01 -06:00
Luke Latham 82d62266c0 Update 'checkbox' (#9419)
Fixes #9418 

Cleaning today and found a note *under my keyboard* to knock these out. 😀
2018-11-10 09:13:52 -10:00
Scott Addie c3eb79666f
c# --> csharp 2018-11-06 14:13:36 -06:00